Tarik Moataz
Tarik Moataz
Verified email at - Homepage
Cited by
Cited by
Boolean searchable symmetric encryption with worst-case sub-linear complexity
S Kamara, T Moataz
Advances in Cryptology–EUROCRYPT 2017: 36th Annual International Conference …, 2017
SQL on structurally-encrypted databases
S Kamara, T Moataz
Advances in Cryptology–ASIACRYPT 2018: 24th International Conference on the …, 2018
Revisiting leakage abuse attacks
L Blackstone, S Kamara, T Moataz
Cryptology ePrint Archive, 2019
Structured encryption and leakage suppression
S Kamara, T Moataz, O Ohrimenko
Advances in Cryptology–CRYPTO 2018: 38th Annual International Cryptology …, 2018
Computationally volume-hiding structured encryption
S Kamara, T Moataz
Advances in Cryptology–EUROCRYPT 2019: 38th Annual International Conference …, 2019
Boolean symmetric searchable encryption
T Moataz, A Shikfa
Proceedings of the 8th ACM SIGSAC symposium on Information, computer and …, 2013
Constant communication ORAM with small blocksize
T Moataz, T Mayberry, EO Blass
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications …, 2015
Forward and backward private searchable encryption with SGX
G Amjad, S Kamara, T Moataz
Proceedings of the 12th European Workshop on Systems Security, 1-6, 2019
Breach-resistant structured encryption
G Amjad, S Kamara, T Moataz
Cryptology ePrint Archive, 2018
Structured encryption and dynamic leakage suppression
M George, S Kamara, T Moataz
Annual International Conference on the Theory and Applications of …, 2021
Handling stateful firewall anomalies
F Cuppens, N Cuppens-Boulahia, J Garcia-Alfaro, T Moataz, X Rimasson
IFIP International Information Security Conference, 174-186, 2012
Controlling security in relational databases
S Kamara, T Moataz
US Patent 10,255,454, 2019
Resizable tree-based oblivious RAM
T Moataz, T Mayberry, EO Blass, AH Chan
Financial Cryptography and Data Security: 19th International Conference, FC …, 2015
Sok: Cryptanalysis of encrypted search with leaker–a framework for leakage attack evaluation on real-world data
S Kamara, A Kati, T Moataz, T Schneider, A Treiber, M Yonli
2022 IEEE 7th European Symposium on Security and Privacy (EuroS&P), 90-108, 2022
Encrypted databases for differential privacy
A Agarwal, M Herlihy, S Kamara, T Moataz
Proceedings on Privacy Enhancing Technologies, 2019
Semantic search over encrypted data
T Moataz, A Shikfa, N Cuppens-Boulahia, F Cuppens
ICT 2013, 1-5, 2013
A decentralized and encrypted national gun registry
S Kamara, T Moataz, A Park, L Qin
2021 IEEE Symposium on Security and Privacy (SP), 1520-1537, 2021
{OblivP2P}: An Oblivious {Peer-to-Peer} Content Sharing System
Y Jia, T Moataz, S Tople, P Saxena
25th USENIX Security Symposium (USENIX Security 16), 945-962, 2016
Privacy preserving record matching using automated semi-trusted broker
I Lazrig, T Moataz, I Ray, I Ray, T Ong, M Kahn, F Cuppens, N Cuppens
Data and Applications Security and Privacy XXIX: 29th Annual IFIP WG 11.3 …, 2015
Oblivious substring search with updates
T Moataz, EO Blass
Cryptology ePrint Archive, 2015
The system can't perform the operation now. Try again later.
Articles 1–20